Sciweavers

3474 search results - page 599 / 695
» Data Management in RFID Applications
Sort
View
CIKM
2009
Springer
15 years 11 months ago
Mining tourist information from user-supplied collections
Tourist photographs constitute a large part of the images uploaded to photo sharing platforms. But filtering methods are needed before one can extract useful knowledge from noisy ...
Adrian Popescu, Gregory Grefenstette, Pierre-Alain...
CIKM
2009
Springer
15 years 11 months ago
iPoG: fast interactive proximity querying on graphs
Given an author-conference graph, how do we answer proximity queries (e.g., what are the most related conferences for John Smith?); how can we tailor the search result if the user...
Hanghang Tong, Huiming Qu, Hani Jamjoom, Christos ...
CIKM
2009
Springer
15 years 11 months ago
Role of weak ties in link prediction of complex networks
Plenty of algorithms for link prediction have been proposed and were applied to various real networks. Among these works, the weights of links are rarely taken into account. In th...
Linyuan Lu, Tao Zhou
ISMIS
2009
Springer
15 years 11 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
MKM
2009
Springer
15 years 11 months ago
A Linear Grammar Approach to Mathematical Formula Recognition from PDF
Many approaches have been proposed over the years for the recognition of mathematical formulae from scanned documents. More recently a need has arisen to recognise formulae from PD...
Josef B. Baker, Alan P. Sexton, Volker Sorge